Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Networks and Communications
Volume 2016, Article ID 1620343, 13 pages
http://dx.doi.org/10.1155/2016/1620343
Research Article

Replica Node Detection Using Enhanced Single Hop Detection with Clonal Selection Algorithm in Mobile Wireless Sensor Networks

Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women University, Bharathi Park Road, Mettupalayam Road, Coimbatore, Tamil Nadu 641043, India

Received 7 July 2015; Revised 12 November 2015; Accepted 19 November 2015

Academic Editor: Eduardo da Silva

Copyright © 2016 L. S. Sindhuja and G. Padmavathi. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. C. P. Mayer, “Security and privacy challenges in the internet of things,” Electronic Communications of the EASST, vol. 17, pp. 1–12, 2009. View at Google Scholar
  2. B. Parno, A. Perrig, and V. D. Gligor, “Distributed detection of node replication attacks in sensor networks,” in Proceedings of the IEEE Symposium on Security and Privacy, pp. 49–63, IEEE, May 2005. View at Publisher · View at Google Scholar · View at Scopus
  3. Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie, “Random-walk based approach to detect clone attacks in wireless sensor networks,” IEEE Journal on Selected Areas in Communications, vol. 28, no. 5, pp. 677–691, 2010. View at Publisher · View at Google Scholar · View at Scopus
  4. B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang, “Localized multicast: efficient and distributed replica detection in large-scale sensor networks,” IEEE Transactions on Mobile Computing, vol. 9, no. 7, pp. 913–926, 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. J.-W. Ho, D. Liu, M. Wright, and S. K. Das, “Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks,” Ad Hoc Networks, vol. 7, no. 8, pp. 1476–1488, 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. C.-M. Yu, Y.-T. Tsou, C.-S. Lu, and S.-Y. Kuo, “Localized algorithms for detection of node replication attacks in mobile sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 5, pp. 754–768, 2013. View at Publisher · View at Google Scholar · View at Scopus
  7. J.-W. Ho, M. K. Wright, and S. K. Das, “Fast detection of replica node attacks in mobile sensor networks using sequential analysis,” in Proceedings of the 28th Conference on Computer Communications (INFOCOM '09), pp. 1773–1781, Rio de Janeiro, Brazil, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. M. Conti, R. Di Pietro, L. V. Mancini, and A. Mei, “Emergent properties: detection of the node-capture attack in mobile wireless sensor networks,” in Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec '08), pp. 214–219, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. B. Zhu, V. G. K. Addada, S. Setia, S. Jajodia, and S. Roy, “Efficient distributed detection of node replication attacks in sensor networks,” in Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC '07), pp. 257–266, IEEE, Miami Beach, Fla, USA, December 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. M. Conti, R. Dipietro, and A. Spognardi, “Clone wars: distributed detection of clone attacks in mobile WSNs,” Journal of Computer and System Sciences, vol. 80, no. 3, pp. 654–669, 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. J.-W. Ho, M. Wright, and S. K. Das, “Fast detection of replica node attacks in mobile sensor networks using sequential analysis,” in Proceedings of the 28th Conference on Computer Communications (IEEE INFOCOM '09), pp. 1773–1781, IEEE, Rio de Janeiro, Brazil, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, “Mobile sensor network resilient against node replication attacks,” in Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON '08), pp. 597–599, IEEE, San Francisco, Calif, USA, June 2008. View at Publisher · View at Google Scholar · View at Scopus
  13. W. Z. Khan, M. Y. Aalsalem, M. N. B. M. Saad, and Y. Xiang, “Detection and mitigation of node replication attacks in wireless sensor networks: a survey,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 149023, 22 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. Y. Lou, Y. Zhang, and S. Liu, “Single hop detection of node clone attacks in mobile wireless sensor networks,” in Proceedings of the International Workshop on Information and Electronics Engineering (IWIEE '12), pp. 2798–2803, Harbin, China, March 2012.
  15. T. Spyropoulos, K. Psounis, and C. S. Raghavendra, “Efficient routing in intermittently connected mobile networks: the single-copy case,” IEEE/ACM Transactions on Networking, vol. 16, no. 1, pp. 63–76, 2008. View at Publisher · View at Google Scholar · View at Scopus
  16. T. Spyropoulos, K. Psounis, and C. S. Raghavendra, “Performance analysis of mobility-assisted routing,” in Proceedings of the 7th ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc '06), pp. 49–60, Florence, Italy, 2006.
  17. T. Spyropoulos, A. Jindal, and K. Psounis, “An analytical study of fundamental mobility properties for encounter-based protocols,” International Journal of Autonomous and Adaptive Communications Systems, vol. 1, no. 1, pp. 4–40, 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for ad hoc network research,” Wireless Communications and Mobile Computing, vol. 2, no. 5, pp. 483–502, 2002. View at Publisher · View at Google Scholar · View at Scopus
  19. L. N. De Castro and F. J. Von Zuben, “Learning and optimization using the clonal selection principle,” IEEE Transactions on Evolutionary Computation, vol. 6, no. 3, pp. 239–251, 2002. View at Publisher · View at Google Scholar · View at Scopus
  20. E. Ulker and S. Ulker, “Comparison study for clonal selection algorithm and genetic algorithm,” International Journal of Computer Science & Information Technology, vol. 4, no. 4, pp. 107–118, 2012. View at Google Scholar